Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Network Device Management

SUMMARY You use Configuration Source Management to configure credentials, add or discover devices, view device configurations, and back up device configurations in JSA Risk Manager.

Configuration Source Management will no longer work after the end of 2020, when browsers discontinue support for Adobe Flash. You can configure credentials, protocols, and schedules in the Configuration monitor on JSA 7.4.1, patch 1 and later. For more information about this change, see Juniper Secure Analytics Risk Manager: Adobe Flash End of Life and Changes to Configuration Source Management (CSM).

The data that is obtained from devices in your network is used to populate the topology. You must have administrative privileges to access Configuration Source Management functions from the Admin tab in JSA.

To set up your configuration sources, you must perform the following actions:

  1. Configure your device credentials.
  2. Discover or import devices. You can add network devices to JSA Risk Manager in two ways; discover devices using Configuration Source Management or import a list of devices from a CSV file in Device Import.
  3. Obtain device configuration from each of your devices.
  4. Manage backup jobs to ensure that all updates to device configurations are captured.
  5. Set up the discovery schedule to ensure that new devices are automatically discovered.

You use Configuration Source Management to do the following actions:

If you are using the Juniper NSM device, you must also obtain configuration information.

For more information about adapters that are used to communicate with devices from specific manufacturers, see Juniper Secure Analytics Risk Manager Adapter Configuration Guide.